CVE-2025-68150
Severity CVSS v4.0:
HIGH
Type:
CWE-918
Server-Side Request Forgery (SSRF)
Publication date:
16/12/2025
Last modified:
02/01/2026
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.2 and 9.1.1-alpha.1, the Instagram authentication adapter allows clients to specify a custom API URL via the `apiURL` parameter in `authData`. This enables SSRF attacks and possibly authentication bypass if malicious endpoints return fake responses to validate unauthorized users. This is fixed in versions 8.6.2 and 9.1.1-alpha.1 by hardcoding the Instagram Graph API URL `https://graph.instagram.com` and ignoring client-provided `apiURL` values. No known workarounds are available.
Impact
Base Score 4.0
8.30
Severity 4.0
HIGH
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:* | 8.6.2 (excluding) | |
| cpe:2.3:a:parseplatform:parse-server:9.0.0:-:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha1:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha10:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha11:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha2:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha3:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha4:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha5:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha6:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha7:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha8:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.0.0:alpha9:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.1.0:-:*:*:*:node.js:*:* | ||
| cpe:2.3:a:parseplatform:parse-server:9.1.0:alpha1:*:*:*:node.js:*:* |
To consult the complete list of CPE names with products and versions, see this page



